Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
: End-to-End Hybrid Authenticated Key Exchanges
End-to-end authenticity in public networks plays a significant role. Namely, without
authenticity, the adversary might be able to retrieve even confidential information straight …
authenticity, the adversary might be able to retrieve even confidential information straight …
Reliable broadcast in radio networks: The bounded collision case
We study the problem of achieving global broadcast in a radio network where a node can
multicast messages to all of its neighbors (that is, nodes within some given distance r), and …
multicast messages to all of its neighbors (that is, nodes within some given distance r), and …
Perfectly secure message transmission revisited
Y Wang, Y Desmedt - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
Secure communications guaranteeing reliability and privacy (without unproven
assumptions) in networks with active adversaries has been an important research issue. It …
assumptions) in networks with active adversaries has been an important research issue. It …
[PDF][PDF] Services-oriented dynamic reconfiguration framework for dependable distributed computing
Web services (WS) received significant attention recently because services can be
searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic …
searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic …
Reliable broadcast with respect to topology knowledge
Abstract We study the Reliable Broadcast problem in incomplete networks against a
Byzantine adversary. We examine the problem under the locally bounded adversary model …
Byzantine adversary. We examine the problem under the locally bounded adversary model …
Must the communication graph of MPC protocols be an expander?
Secure multiparty computation (MPC) on incomplete communication networks has been
studied within two primary models:(1) where a partial network is fixed a priori, and thus …
studied within two primary models:(1) where a partial network is fixed a priori, and thus …
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
We study the interplay of network connectivity and the issues related to the'possibility','
feasibility'and'optimality'for unconditionally reliable message transmission (URMT) and …
feasibility'and'optimality'for unconditionally reliable message transmission (URMT) and …
Truly Efficient -Round Perfectly Secure Message Transmission Scheme
K Kurosawa, K Suzuki - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
In the model of perfectly secure message transmission (PSMT) schemes, there are n
channels between a sender and a receiver. An infinitely powerful adversary A may corrupt …
channels between a sender and a receiver. An infinitely powerful adversary A may corrupt …
Truly efficient 2-round perfectly secure message transmission scheme
K Kurosawa, K Suzuki - Advances in Cryptology–EUROCRYPT 2008: 27th …, 2008 - Springer
In the model of perfectly secure message transmission schemes (PSMTs), there are n
channels between a sender and a receiver. An infinitely powerful adversary may corrupt …
channels between a sender and a receiver. An infinitely powerful adversary may corrupt …
Numerical computation of multi-goal security strategies
Security is often investigated in terms of a single goal (eg, confidentiality), but in practical
settings mostly a compound property comprising multiple and often interdependent aspects …
settings mostly a compound property comprising multiple and often interdependent aspects …